Technical Field
[0001] The system and method relates to device security systems and in particular to security
systems that monitoring user behavior in mobile devices.
Background
[0002] As a result of their mobility, mobile communication devices are sometimes lost or
stolen. As the complexity of mobile devices increases, the amount of sensitive information
stored in the mobile device also increases. The result is an increasing need for protection
of sensitive information stored in mobile devices.
[0003] Currently, some security systems for mobile devices require that a user report that
the mobile device has been lost or stolen. Upon notification that the mobile device
has been lost or stolen, an administrator can send a command to the mobile device
that can lock the mobile device or wipe sensitive information from the mobile device.
However, for this method to be effective, the user must report to the administrator
that the mobile device has been lost or stolen before any sensitive information has
been removed from the mobile device. Moreover, the mobile device must be connected
to a network in order to receive the command to lock or wipe the mobile device.
[0004] Mobile device security systems such as disclosed in
U.S. Patent Publication 2008/0009264 allow for a mobile device to be secured while not connected to a network based on
limited predefined events such as a user locking the device, the mobile device not
being in the proximity of a holster, powering down the mobile device, closing the
mobile device, or the lack of communication with the network.
[0005] Other systems, such as disclosed in
U.S. Patent No. 7,373,137 allow a user to define a set of authorized call numbers. This prevents an unauthorized
user from making calls to any number that is not authorized.
[0006] The problem with these systems is that they do not monitor secure events and non-secure
events to provide a robust mechanism to secure a mobile device. As a result, these
systems are very limited in their methods of securing a mobile device.
Summary
[0007] In accordance with the invention there is provided a system according to claim 1.
Further in accordance with the invention there is provided a method according to claim
6.
[0008] The system and method are directed to solving these and other problems and disadvantages
of the prior art. Typically, the system and method are implemented on a mobile device
as a way of securing the mobile device. The system applies rules to determine if an
event associated with an application is a secure event. If the event is a secure event,
the system applies the rules to determine if the event is authenticated. If the event
is authenticated, the event is authorized and the system updates rule data associated
with the event and/or other associated events. Updating the rule data allows other
associated events to be authenticated. The user can access an application and/or data
associated with the application.
[0009] If the event is not authenticated, the system requests authentication from a user.
If the authentication is valid, the event is authorized and the system updates the
rule data associated with the event and/or other associated events. The user can access
the application and/or data associated with the event. If the authentication is not
valid, the system secures the mobile device.
Brief Description of the Drawings
[0010] These and other features and advantages of the system and method will become more
apparent from considering the following description of an illustrative embodiment
of the system and method together with the drawing, in which:
Figure 1 is a block diagram illustrating a system for securing a device.
Figure 2 is a block diagram illustrating a system for securing a mobile device.
Figure 3 is a flow diagram illustrating a method for securing a device.
Figure 4 is a flow diagram illustrating a method for securing a device.
Figure 5 is a flow diagram illustrating a method for determining if events are secure
events or non-secure events and for associating events.
Detailed Description
[0011] Figure 1 is a block diagram illustrating a system 110 for securing a device 100.
The system 110 comprises a device 100, which includes an authentication module 102,
a behavior module 103, rules 104, and one or more applications 105. The applications
105 contain application data 106. The rules 104 contain secure rules 104A, non-secure
rules 104B, and rule data 107. The applications 105 generate events 101.
[0012] The device 100 may be a mobile device such as a telephone, a laptop computer, a Personal
Digital Assistant (PDA), or a non-mobile device such as a Personal Computer (PC).
An application 105 could be any application 105 such as an operating system, an e-mail
application, a calendaring application, a web browser, a contact list application,
a telephony application, a Global Positioning System (GPS) application, a device docking
application, a memory manager, and the like. The application data 106 is data that
is associated with the application 105. For example, an operating system has associated
files, directories, and disk drives that contain application data 106 that is used
by the operating system. Likewise, a calendaring application has application data
associated with calendar items.
[0013] An event 101 could be any event generated by an application 105 such as: accessing
a network, opening the application, accessing a file, accessing a directory, accessing
a memory device, inserting a device into a docking station, removing a memory device,
inserting a memory device, receiving an email, sending an email, receiving a file,
sending a file, copying a file, accessing a device, entering a secure location, leaving
a secure location, connecting to a network, disconnecting from a network, accessing
a calendar, receiving a phone call, placing a phone call, and the like. Examples of
events 101 generated by an applications 105 are: opening a web browser, accessing
a contact list in a telephone, inserting a laptop into a docking station, and the
like. An event 101 can be a secure event 101A or a non-secure event 101 B. A secure
event 101A is an event 101 that requires authentication.
[0014] The rules 104 define the way events 101 are authenticated. A rule 104 may authenticate
multiple events 101 based on a single event 101. There are secure rules 104A, non-secure
rules 104B, and some rules 104 that apply to both secure events 101A and non-secure
events 101B. Secure rules 104A are typically associated with secure events 101 A.
Non-secure rules 104B are typically associated with non-secure events 101 B. A non-secure
event 101 B does not require authentication. A non-secure event 101 B can become a
secure event 101 A based on the rules 104. A secure event 101A can become a non-secure
event 101B based on the rules 104. The rules 104 also contain rule data 107. Rule
data 107 has information such as, which events 101 have been authenticated, the number
of times an event 101 occurred, if a user is logged on to a network, if a laptop is
connected to a docking station, timer information, and the like.
[0015] The authentication module 102 applies the rules 104 in conjunction with the rule
data 107 to determine if an event 101 is a secure event 101A or a non-secure event
101 B. The authentication module 102 can authenticate an event 101 with a variety
of mechanisms such as a password, a biometric, an ID card, and the like. The authentication
module 102 also applies the rules 104 in conjunction with the rule data 107 to determine
which events 101 are authorized and which events 101 need to be authenticated. The
behavior module 103 works in conjunction with the authentication module 102 to update
the rule data 107, authorize events 101, determine if events 101 are static events,
and secure the device 100.
[0016] When an event 101 is generated, the authentication module 102 applies the rules 104
and the rule data 107 to determine if an event 101 is a secure event 101 A. If the
event 101 is a non-secure event 101B, the behavior module 103 authorizes the event
101 and updates the rule data 107. The authentication module 102 then waits for another
event 101.
[0017] If the event 101 is a secure event 101 A, the authentication module 102 determines
if the event 101 has previously been authenticated. Authentication can be accomplished
in a variety of ways based on the rules 104. For example, a user may have previously
entered an access code to allow calling a telephone number or an area code.
[0018] If the event 101 is authenticated, the behavior module 103 authorizes the event 101
and updates the rule data 107. If the event 101 is not authenticated, the authentication
module 102 requests authentication. The authentication module 102 determines if the
authentication is valid. If the authentication is valid, the behavior module 103 authorizes
the event 101 and updates the rule data 107. Otherwise, if the authentication is not
valid, the behavior module 103 secures the device 100. A device 100 can be secured
in many ways. For example, some or all application data 106 can be deleted from the
device 100. Or, applications 105 can be deleted from the device 100. Other examples
include, but are not limited to encrypting application data 106 and locking the device
100.
[0019] To give an overall view of an event flow of an email system, consider the following
example. Bob has a new laptop 100 that has an email application 105. The email application
105 has a set of email contact lists 106. The laptop 100 contains five rules 104:
1) a secure rule 104A that opening the email application 105 is a secure event 101A,
2) a secure rule 104A that sending emails is a secure event 101A, 3) a non-secure
rule 104B that logging on and off the work network is a non-secure event 101B, 4)
a rule 104 that authorizes access to all applications 105 on the laptop 100 while
logged into a work network, and 5) a rule 104 that authenticates all emails sent by
Bob while logged on to the work network. The fourth and fifth rules are rules 104
that associate an event 101 with other events 101. Rule four associates the event
101 of logging on to the work network with the events 101 of running applications
105 on the laptop 100. Rule five associates the event 101 of logging on to the work
network with the event 101 of sending emails.
[0020] From the laptop 100, Bob attempts to log on to the work network. This generates a
first event 101. The authentication module 102 applies the rules 104 in conjunction
with the rule data 107 to determine that the first event 101 of logging on to the
work network is a non-secure event 101B (see rule three above). The behavior module
103 authorizes Bob to login to the work network and Bob logs into the work network.
The behavior module 103 updates the rule data 107 to indicate that Bob is now logged
on to the work network. Next, Bob attempts to open the email application 105. This
generates a second event 101. The authentication module 102 determines that opening
the email application is a secure event 101A based on a secure rule 104A (see rule
one above) and requires authentication. The authentication module 102 determines that
since Bob is logged on to the work network, the second event 101 of opening the email
application 105 is authenticated (see rule four above). The behavior module 103 authorizes
the event 101 of opening the email application 105. Bob opens the email application
105. The behavior module103 updates the rule data 107 to indicate that the email application
105 is now authenticated.
[0021] From the email application 105, Bob sends an email to Tom. This generates a third
event 101. The authentication module 102 determines by applying the secure rule 104A
(see rule five above) in conjunction with the rule data 107 that this is a secure
event 101 A. The authentication module 102 determines that since Bob is logged on
to the work network, the event 101 of sending an email to Tom is authenticated (see
rule five above). The behavior module 103 authorizes the event 101 of Bob sending
an email to Tom. The behavior module 103 updates the rule data 107 to indicate that
the event 101 of Bob sending an email to Tom is authenticated. Bob now logs off the
work network. This generates a fourth event 101. The authentication module 102 applies
the non secure rule 104B (see rule three above) and determines that the fourth event
101 of logging off the work network is a non-secure event 101B. The non-secure event
101 B of logging off the work network is authorized by the behavior module 103. Bob
logs off of the work network. The rule data 107 is updated to indicate that Bob is
no longer logged on to the work network.
[0022] Bob leaves work and is working from home. Bob attempts to access the email application
105. This generates a fifth event 101. The authentication module 102 applies the secure
rule 104A (see rule one above) to determine that opening the email application 105
is a secure event 101 A. The authentication module 102 determines that Bob is no longer
logged onto the work network by looking at the rule data 107. The authentication module
102 requests authentication from Bob because the event 101 of opening the email application
105 is not longer authenticated. The event of opening the email application 105 is
not authenticated because Bob is no longer logged into the work network. Bob authenticates
by entering a password. The authentication module 102 determines that the authentication
is valid. Bob is authorized to use the email application 105 and the rule data 107
is updated. Bob now sends an email to Tom. This generates a sixth event 101. The authentication
module 102 applies the secure rule 104A (see rule two above) and determines that the
event 101 of sending an email is a secure event 101 A. The authentication module 102
applies the secure rule 104A (see rule five above) and looks at the rule data to determine
that the event 101 of sending an email to Tom is authenticated because Bob already
sent an email to Tom while logged on to the work network.
[0023] Next, Bob tries to send an email to Sally. This generates a seventh event 101. The
authentication module 102 applies the secure rule 104A (see rule two above) to determine
that the event 101 of sending an email is a secure event 101A. The authentication
module 102 applies the secure rule 104A (see rule five above) to determine that the
event 101 of sending an email to Sally is not authenticated because Bob never emailed
Sally while logged on to the work network. The authentication module 102 now requests
Bob to authenticate sending an email to Sally.
[0024] In a second example, assume that Bob's laptop 100 was stolen after Bob logged off
the work network. The thief attempts to open the email application 105. This generates
an event 101. The authentication module 102 applies the secure rules 104A (see rule
one above) and determines that authentication is required. The authentication module
102 requests authentication from the thief because the thief is not logged on to the
work network. If the authentication is not valid, the behavior module 103 secures
the laptop 100.
[0025] Figure 2 is a block diagram illustrating a system 210 for securing a mobile device.
The system 210 comprises a device 200, which includes an authentication module 102,
and a behavior module 103. The system 210 includes rules 104, which further include
secure rules 104A, non-secure rules 104B, and rule data 107. The system 210 includes
the following applications 105: a docking station interface application 201, a cell
network/Wi-Fi/Bluetooth application 202, a GPS application 203, an operating system
204, a SIM/memory card interface application 206, and an email/calendar application
205. The system 210 includes application data 106 associated with applications 105.
The contact lists 207 are associated with the email/calendar application 205. The
files 208 are associated with the operating system 208 and possibly other applications
such as the GPS application 203.
[0026] Each of the applications 201-206 can generate one or more events 101. When an event
101 is generated, the authentication module 102 applies the rules 104 in conjunction
with the rule data 107 to determine if the event 101 is a secure event 101A. If the
event 101 is a non-secure event 101B, the event 101 is authorized, the rule data 107
is updated, and the authentication module 102 waits for another event 101.
[0027] If the event 101 is a secure event 101A, the authentication module 102 applies the
rules 104 in conjunction with the rule data 107 and determines if the event 101 is
authenticated. If the event 101 is authenticated, the behavior module 103 authorizes
the event and updates the rule data 107.
[0028] If the event 101 is not authenticated, the authentication module 102 requests authentication.
The authentication module 102 determines if the authentication is valid (e.g., after
three failed authentication attempts). If the authentication is valid, the behavior
module 103 authorizes the event 101 and updates the rule data 107. Otherwise, if the
authentication is not valid, the behavior module 103 secures the device 100 by locking
it, or by deleting and/or encrypting the data 207, 208.
[0029] Figure 3 is a flow diagram illustrating a method for securing a device 100. Illustratively,
authentication module 102 and behavior module 103 are implemented as a stored-program-controlled
entity, such as a computer, which performs the method of Figures 3-5 by executing
a program stored in a storage medium, such as a memory or disk. The process waits
300 for an event 101 to be generated. After an event 101 is generated, the process
applies the rules 104 in conjunction with the rule data 107 to determine 301 if the
event 101 is a secure event 101 A. If the event 101 is a non-secure event 101 B, the
process waits 300 for the next event 101.
[0030] If the process determines 301 that the event 101 is a secure event 101A, the process
applies the rules 104 in conjunction with the rule data 107 to determine 302 if the
event 101 is authenticated. If the event 101 is authenticated, the process authorizes
307 the event 101, updates 306 the rule data 107, and waits 300 for the next event
101. If the event 101 is not authenticated, the process requests 303 authentication.
Requesting 303 authentication could be displaying a login prompt to a user, sending
a message, and the like. After receiving an authentication from a user, the process
determines 304 if the authentication is valid. If the authentication is not valid,
the process secures 308 the device 100. If the authentication is determined 304 to
be valid, the process authorizes 307 the event 101, updates 306 the rule data 107,
and waits 300 for the next event 101.
[0031] Figure 4 is a flow diagram illustrating an alternative method for securing a device
100. The process waits 400 for an event 101 to be generated. After an event 101 is
generated, the process applies the rules 104 in conjunction with the rule data 107
to determine 401 if the event 101 is a secure event 101 A. If the event 101 is a non-secure
event 101 B, the process authorizes 407 the event 101, updates 406 the rule data 107,
and waits 400 for the next event 101.
[0032] If the process determines 401 that the event 101 is a secure event 101A, the process
applies the rules 104 in conjunction with the rule data 107 to determine 402 if the
event 101 is authenticated. If the event 101 is authenticated, the process authorizes
407 the event 101, updates 406 rule data 107, and waits 400 for the next event 101.
If the event 101 is not authenticated, the process requests 403 authentication. After
receiving an authentication from a user, the process determines 404 if the authentication
is valid. If the authentication is not valid, the process secures 408 the device 100.
[0033] If the authentication is determined 404 to be valid, the process determines 405 if
the event 101 is a static event. A static event is an event 101 that is does not use
rule data 107. For example, a secure event 101A that allways requires authentication
regardless of any state of the device 100 or events 101 would be considered a static
event (e.g., always requiring a login to a laptop regardles of any other events 101).
If the event 101 is not a static event, the process authorizes 407 the event 101,
updates 406 the rule data 107, and waits 400 for the next event 101. Otherwise, the
process authorizes 409 the event 101.
[0034] Figure 5 is a flow diagram illustrating a method for determining if events 101 are
secure events 101A or non-secure events 101 B and for associating events 101 with
other events. Figure 5 is more detailed view of step 406 in Figure 4. The process
applies the rules 104 in conjunction with the rule data 107 to determine 500 if the
event 101 is a secure event 101A or a non-secure event 101B. A secure event 101A requires
authentication and a non-secure event 101B does not require authentication. A non-secure
event 101 B may be converted to a secure event based 101A on the rules 104 and rule
data 107. Likewise, a secure event 101A may be converted to a non-secure event 101B
based on the rules 104 and rule data 107.
[0035] The process determines 501 if the event 101 has any associated events. If the event
101 does not have other associated events, the process updates 503 the rule data 107
for the event 101. If the event 101 has other associated events, the process updates
502 the rule data 107 for the associated events and updates 503 the rule data 107
for the event 101.
[0036] There are many ways that a non-secure event 101B can be converted to a secure event
101A or a secure event 101A can be converted to a non-secure event 101B. For example,
an event 101 may start out as a non-secure event 101. A rule 104 for the event 101
states that if the contact lists for telephone calls are accessed more than ten times
within a one hour period, then the non-secure event 101B of accessing the contact
list will become a secure event 101A. The user would have to re-authenticate the next
time the user tried to access the contact list for telephone calls. The event 101
of accessing the contact lists could return to a non-secure event 101 B after the
user re-authenticates if the rules 104 so dictate.
[0037] Of course, various changes and modifications to the illustrative embodiment described
above will be apparent to those skilled in the art. For example, the evaluation of
security events may take place on the device and/or in the network. The physical connectivity
could be a wireless connection, a USB connection, or hardwired network devices. Events
from any new type of I/O device could be monitored such as: web enabled phones accessing
new or sufficiently different web sites or content (e.g. foreign language sites, different
search engines, and the like), sending pictures where pictures have never been sent
before, and/or linking to a new Bluetooth device. In addition, events could be monitored
during the boot up process of a device. Other events such as location in conjunction
with other events could be used. Other examples could be where the first round of
authentication is good and a thief tries to access a bank account over the phone and
repeated attempts fail. In this case the primary authentication method would be invoked
and/or the device could be locked. Another example could be using a GPS phone in conjunction
with an interferometer to detect a person's walking verses a usual walking pattern.
These changes and modifications can be made without departing from the scope of the
system and method and without diminishing its attendant advantages. It is therefore
intended that such changes and modifications be covered by the following claims except
insofar as limited by the prior art.
1. A system (110) for securing a device (100) comprising:
a. a behavior module (103) for authorizing events, updating rule data (104), and securing
the device (100);
b. an authentication module (102) responsive to a first event being a secure event,
for determining if the first event is authenticated;
c. responsive to the first event being authenticated, for directing the behavior module
(103) to authorize the first event and to update the rule data (104);
d. responsive to the first event not being authenticated, for determining if authentication
credentials received from a user who invoked the first event are valid;
e. responsive to the authentication credentials received from the user being valid,
for directing the behavior module (103) to authorize the first event and update the
rule data (104) associated with the first event, wherein the updated rule data (104)
allows other associated events to be authenticated; and
f. responsive to the authentication credentials received from the user not being valid,
for directing the behavior module (103) to secure the device (100) by preventing use
of the device.
2. The system (110) of claim 1, wherein the authentication module (102) is responsive
to the first event not being a secure event, for directing the behavior module (103)
to authorize the first event and update the rule data (104) and wherein the behavior
module (103) is responsive to the first event being a non-secure event, updating the
rule data (104) by converting the first event into a secure event.
3. The system (110) of claim 1, wherein the first event is a secure event, and wherein
the behavior module (103) is further adapted for converting the first event into a
non-secure event.
4. The system (110) of claim 1, wherein the authentication module (102) is responsive
to the authentication being valid, for directing the behavior module (103) to determine
if the first event is a static event, and wherein the behavior module (103) is responsive
to the first event not being a static event, for authorizing the first event and updating
the rule data (104).
5. The system (110) of claim 1, wherein the authentication module (102) is adapted to
determine if the authentication is valid based on a prior authentication of the first
event or on a prior authentication of an associated event.
6. A method for securing a device (100) comprising:
a. determining if a first event is a secure event (301);
b. in response to determining that the first event is a secure event, determining
if the first event is authenticated (302);
c. in response to determining that the first event is authenticated, proceeding to
step (f);
d. in response to determining that the first event is not authenticated, determining
if authentication credentials received from a user who invoked the first event are
valid (304);
e. in response to determining that the authentication credentials received from the
user are valid proceeding to step (f);
f. authorizing the first event (307) and updating rule data associated with the first
event (306), wherein the updated rule data allows other associated events to be authenticated;
and
g. in response to determining that the authentication credentials received from the
user are not valid, securing the device by preventing use of the device (308).
7. The method of claim 6, further comprising: in response to determining that the first
event is not a secure event (401), proceeding to step (f) and wherein in response
to the first event being a non-secure event, updating the rule data (406) by converting
the first event into a secure event.
8. The method of claim 6, wherein the first event is a secure event and wherein updating
the rule data (406) further comprises converting the first event into a non-secure
event.
9. The method of claim 6, wherein the step of determining if the authentication is valid
(404), further comprises determining if the first event is a static event (405), and
in response to the first event not being a static event, proceeding to step (f).
10. The method of claim 6, wherein determining if the authentication is valid (404) is
based on a prior authentication of the first event or on a prior authentication of
an associated event.
1. System (110) zum Sichern einer Vorrichtung (100), das Folgendes umfasst:
a. ein Verhaltensmodul (103) zum Autorisieren von Ereignissen, Aktualisieren von Regeldaten
(104) und Sichern der Vorrichtung (100);
b. ein Authentifizierungsmodul (102), das darauf reagiert, dass ein erstes Ereignis
ein sicheres Ereignis ist, zum Bestimmen, ob das erste Ereignis authentifiziert ist;
c. als Reaktion darauf, dass das erste Ereignis authentifiziert ist, zum Anweisen
des Verhaltensmoduls (103), das erste Ereignis zu autorisieren und die Regeldaten
(104) zu aktualisieren;
d. als Reaktion darauf, dass das erste Ereignis nicht authentifiziert ist, zum Bestimmen,
ob Authentifizierungsreferenzen, die von einem Benutzer empfangen wurden, der das
erste Ereignis aufgerufen hatte, gültig sind;
e. als Reaktion darauf, dass die Authentifizierungsreferenzen, die von dem Benutzer
empfangen wurden, gültig sind, zum Anweisen des Verhaltensmoduls (103), das erste
Ereignis zu autorisieren und die Regeldaten (104), die mit dem ersten Ereignis assoziiert
sind, zu aktualisieren, wobei die aktualisierten Regeldaten (104) ermöglichen, dass
andere assoziierte Ereignisse authentifiziert werden; und
f. als Reaktion darauf, dass die Authentifizierungsreferenzen, die von dem Benutzer
empfangen wurden, nicht gültig sind, zum Anweisen des Verhaltensmoduls (103), die
Vorrichtung (100) durch Verhindern der Verwendung der Vorrichtung zu sichern.
2. System (110) nach Anspruch 1, wobei das Authentifizierungsmodul (102) dahingehend
darauf reagiert, dass das erste Ereignis kein sicheres Ereignis ist, das Verhaltensmodul
(103) anzuweisen, das erste Ereignis zu autorisieren und die Regeldaten (104) zu aktualisieren,
und wobei das Verhaltensmodul (103) dahingehend darauf reagiert, dass das erste Ereignis
ein unsicheres Ereignis ist, die Regeldaten (104) durch Umwandeln des ersten Ereignisses
in ein sicheres Ereignis zu aktualisieren.
3. System (110) nach Anspruch 1, wobei das erste Ereignis ein sicheres Ereignis ist und
wobei das Verhaltensmodul (103) weiterhin zum Umwandeln des ersten Ereignisses in
ein unsicheres Ereignis eingerichtet ist.
4. System (110) nach Anspruch 1, wobei das Authentifizierungsmodul (102) dahingehend
darauf reagiert, dass die Authentifizierung gültig ist, das Verhaltensmodul (103)
anzuweisen zu bestimmen, ob das erste Ereignis ein statisches Ereignis ist, und wobei
das Verhaltensmodul (103) dahingehend darauf reagiert, dass das erste Ereignis kein
statisches Ereignis ist, das erste Ereignis zu autorisieren und die Regeldaten (104)
zu aktualisieren.
5. System (110) nach Anspruch 1, wobei das Authentifizierungsmodul (102) dazu eingerichtet
ist, auf der Basis einer vorherigen Authentifizierung des ersten Ereignisses oder
auf einer vorherigen Authentifizierung eines assoziierten Ereignisses zu bestimmen,
ob die Authentifizierung gültig ist.
6. Verfahren zum Sichern einer Vorrichtung (100), das Folgendes umfasst:
a. Bestimmen, ob ein erstes Ereignis ein sicheres Ereignis ist (301);
b. als Reaktion darauf, dass das erste Ereignis ein sicheres Ereignis ist, Bestimmen,
ob das erste Ereignis authentifiziert ist (302;
c. als Reaktion auf das Bestimmen, dass das erste Ereignis authentifiziert ist, Fortschreiten
zu Schritt (f) ;
d. als Reaktion darauf, dass das erste Ereignis nicht authentifiziert ist, Bestimmen,
ob Authentifizierungsreferenzen, die von einem Benutzer empfangen wurden, der das
erste Ereignis aufgerufen hatte, gültig sind (304);
e. als Reaktion auf das Bestimmen, dass die Authentifizierungsreferenzen, die von
dem Benutzer empfangen wurden, gültig sind, Fortschreiten zu Schritt (f) ;
f. Autorisieren des ersten Ereignisses (307) und Aktualisieren von Regeldaten, die
mit dem ersten Ereignis assoziiert sind (306), wobei die aktualisierten Regeldaten
ermöglichen, dass andere assoziierte Ereignisse authentifiziert werden; und
g. als Reaktion auf das Bestimmen, dass die Authentifizierungsreferenzen, die von
dem Benutzer empfangen wurden, nicht gültig sind, Sichern der Vorrichtung durch Verhindern
der Verwendung der Vorrichtung (308).
7. Verfahren nach Anspruch 6, das weiterhin Folgendes umfasst: als Reaktion auf das Bestimmen,
dass das erste Ereignis kein sicheres Ereignis ist (401), Fortschreiten zu Schritt
(f), und als Reaktion darauf, dass das erste Ereignis ein unsicheres Ereignis ist,
Aktualisieren der Regeldaten (406) durch Umwandeln des ersten Ereignisses in ein sicheres
Ereignis.
8. Verfahren nach Anspruch 6, wobei das erste Ereignis ein sicheres Ereignis ist und
wobei das Aktualisieren der Regeldaten (406) weiterhin das Umwandeln des ersten Ereignisses
in ein unsicheres Ereignis umfasst.
9. Verfahren nach Anspruch 6, wobei der Schritt des Bestimmens, ob die Authentifizierung
gültig ist (404), das Bestimmen, ob das erste Ereignis ein statisches Ereignis ist
(405), und als Reaktion darauf, dass das erste Ereignis kein statisches Ereignis ist,
das Fortschreiten zu Schritt (f) umfasst.
10. Verfahren nach Anspruch 6, wobei das Bestimmen, ob die Authentifizierung gültig ist
(404), auf einer vorherigen Authentifizierung des ersten Ereignisses oder auf einer
vorherigen Authentifizierung eines assoziierten Ereignisses basiert.
1. Un système (110) pour sécuriser un dispositif (100) comprenant :
a. un module de comportement (103) pour autoriser des événements, mettre à jour les
données des règles (104) et sécuriser le dispositif (100) ;
b. un module d'authentification (102) réagissant à un premier événement étant un événement
sécurisé, pour déterminer si le premier événement est authentifié ;
c. réagissant au premier événement qui est authentifié, afin de diriger le module
de comportement (103) pour autoriser le premier événement et pour mettre à jour les
données des règles (104) ;
d. réagissant au premier événement qui n'est pas authentifié, afin de déterminer si
les informations d'authentification reçues d'un utilisateur qui a invoqué le premier
événement sont valides ;
e. réagissant aux informations d'authentification reçues de l'utilisateur qui sont
valides, afin de diriger le module de comportement (103) pour autoriser le premier
événement et mettre à jour les données des règles (104) associées au premier événement,
dans lequel les données des règles mises à jour (104) permettent à d'autres événements
associés d'être authentifiées ; et
f. réagissant aux informations d'authentification reçues de l'utilisateur qui ne sont
pas valides, afin de diriger le module de comportement (103) pour sécuriser le dispositif
(100) en empêchant l'utilisation du dispositif
2. Le système (110) selon la revendication 1, dans lequel le module d'authentification
(102) est en réponse au premier événement qui n'est pas un événement sécurisé, afin
de diriger le module de comportement (103) pour autoriser le premier événement et
mettre à jour les données des règles (104) et dans lequel le module de comportement
(103) est en réponse au premier événement qui est un événement non sécurisé, pour
mettre à jour les données des règles (104) en convertissant le premier événement en
un événement sécurisé.
3. Le système (110) selon la revendication 1, dans lequel le premier événement est un
événement sécurisé, et dans lequel le module de comportement (103) est en outre adapté
pour convertir le premier événement en un événement non sécurisé.
4. Le système (110) selon la revendication 1, dans lequel le module d'authentification
(102) est en réponse à l'authentification qui est valide, afin de diriger le module
de comportement (103) pour déterminer si le premier événement est un événement statique,
et dans lequel le module de comportement (103) est en réponse au premier événement
qui n'est pas un événement statique, pour autoriser le premier événement et mettre
à jour les données des règles (104).
5. Le système (110) selon la revendication 1, dans lequel le module d'authentification
(102) est adapté pour déterminer si l'authentification est valide sur la base d'une
authentification préalable du premier événement ou d'une authentification préalable
d'un événement associé.
6. Un procédé pour sécuriser un dispositif (100) comprenant :
a. la détermination si un premier événement est un événement sécurisé (301) ;
b. en réponse à la détermination que le premier événement est un événement sécurisé,
la détermination si le premier événement est authentifié (302) ;
c. en réponse à la détermination que le premier événement est authentifié, le passage
à l'étape (f) ;
d. en réponse à la détermination que le premier événement n'est pas authentifié, la
détermination si les informations d'authentification reçues d'un utilisateur qui a
invoqué le premier événement sont valides (304) ;
e. en réponse à la détermination que les informations d'authentification reçues de
l'utilisateur sont valides le passage à l'étape (f) ;
f. l'autorisation du premier événement (307) et la mise à jour des données des règles
associés au premier événement (306), dans lequel les données des règles mises à jour
permettent à d'autres événements associés d'être authentifiés ; et
g. en réponse à la détermination que les informations d'authentification reçues d'un
utilisateur ne sont pas valides, la sécurisation du dispositif en empêchant l'utilisation
du dispositif (308).
7. Le procédé selon la revendication 6, comprenant en outre : en réponse à la détermination
que le premier événement n'est pas un événement sécurisé (401), le passage à l'étape
(f) et dans lequel en réponse au premier événement qui est un événement non sécurisé,
la mise à jour des données des règles (406) en convertissant le premier événement
en un événement sécurisé.
8. Le procédé selon la revendication 6, dans lequel le premier événement est un événement
sécurisé et dans lequel la mise à jour des données des règles (104) comprend en outre
la conversion du premier événement en un événement non sécurisé.
9. Le procédé selon la revendication 6, dans lequel l'étape de la détermination si l'authentification
est valide (404) comprend en outre la détermination si le premier événement est un
événement statique (405), et en réponse au premier événement qui n'est pas un événement
statique, le passage à l'étape (f).
10. Le procédé selon la revendication 6, dans lequel la détermination si l'authentification
est valide (404) est base sur une authentification préalable du premier événement
ou sur une authentification préalable d'un événement associé.